Browse Prior Art Database

Data Encryption and Decryption with Chaotic Wavelet System (CWS)

IP.com Disclosure Number: IPCOM000015203D
Original Publication Date: 2002-Mar-08
Included in the Prior Art Database: 2003-Jun-20
Document File: 4 page(s) / 162K

Publishing Venue

IBM

Abstract

Disclosed is a system that utilizes properties and features in chaotic and wavelet systems to provide an advanced mechanism for data encryption and decryption. This new method encrypts data with high-level of complexity for identification, authentication, and protection of information resources. In addition, this invention can be used to minimize threats that jeopardize the protection of sensitive information, and to guarantee security outside the bounds of a single processor. However, unlike existing cryptographic systems and methods, the cryptographic method employed in this invention is a unique data encryption decryption process. The encryption process consists of two phases: first, it transforms data from a one-dimensional domain to a 2-dimensional wavelet domain, then, the transformed data is modulated by a chaotic system to form a complex encrypted data sequence. As a result, the level of encryption complexity in this invention is very high, thus, the chances of breaking its code is minimized, virtually zero, and hence, the integrity of information is securely protected. By using both wavelet transform and chaos technologies, this invention attempts to exploit many advantages that both wavelet and chaos provide to information encryption technology, such as:

This text was extracted from a PDF file.
At least one non-text object (such as an image or picture) has been suppressed.
This is the abbreviated version, containing approximately 52% of the total text.

Page 1 of 4

Data Encryption and Decryption with Chaotic Wavelet System (CWS)

Disclosed is a system that utilizes properties and features in chaotic and wavelet systems to provide an advanced mechanism for data encryption and decryption. This new method encrypts data with high-level of complexity for identification, authentication, and protection of information resources. In addition, this invention can be used to minimize threats that jeopardize the protection of sensitive information, and to guarantee security outside the bounds of a single processor. However, unlike existing cryptographic systems and methods, the cryptographic method employed in this invention is a unique data encryption / decryption process. The encryption process consists of two phases: first, it transforms data from a one-dimensional domain to a 2-dimensional wavelet domain, then, the transformed data is modulated by a chaotic system to form a complex encrypted data sequence. As a result, the level of encryption complexity in this invention is very high, thus, the chances of breaking its code is minimized, virtually zero, and hence, the integrity of information is securely protected. By using both wavelet transform and chaos technologies, this invention attempts to exploit many advantages that both wavelet and chaos provide to information encryption technology, such as:

Extremely High Level of Complexity: Since the input information presented to the system will be wavelet transformed, then integrated in a chaotic sequence, therefore, the resulting output is a very complex encrypted information.

Hardware Realization: One of the most advantages that this system offers is that it can be hardware realization as a stand-alone cryptographic adapter, or personal security card, or a security interface unit.

Wireless Application: The encoded information generated by CWS not only is securely transmitted electronically through communications networks, it can also be securely used in many wireless applications for transmitting/receiving signals.

1. Complete System Architecture Overview of the Chaotic Wavelet System (CWS) for Data Encryption and Decryption

As shown in Fig. 1, the architecture of the CWS consists of 2 separate components, the CWS Encoder and the CWS Decoder. Each component consists of a wavelet transform, a nonlinear dynamic (or chaos) generator, a set of libraries for wavelet and chaos selection, and an integrator. This system's encryption method is using symmetric key for both encoder and decoder ends (i.e., both the encoder and decoder know the single key and must maintain the integrity and confidential of the key value). As a requirement, the initial key must be exchanged between the parties in a secure manner preserving both integrity and confidentiality. The initial key is a combination of a wavelet function (WF) selection, a chaos model (CM) selection, and its set of initial condition values (ICV).

1

Page 2 of 4

Figure 1 - Chaotic Wavelet System (CWS) for Data...